grafana/pkg/registry/apis/datasource/authorizer.go

83 lines
2.4 KiB
Go

package datasource
import (
"context"
"fmt"
"k8s.io/apiserver/pkg/authorization/authorizer"
"github.com/grafana/grafana/pkg/infra/appcontext"
ac "github.com/grafana/grafana/pkg/services/accesscontrol"
"github.com/grafana/grafana/pkg/services/datasources"
)
func (b *DataSourceAPIBuilder) GetAuthorizer() authorizer.Authorizer {
return authorizer.AuthorizerFunc(
func(ctx context.Context, attr authorizer.Attributes) (authorized authorizer.Decision, reason string, err error) {
if !attr.IsResourceRequest() {
return authorizer.DecisionNoOpinion, "", nil
}
user, err := appcontext.User(ctx)
if err != nil {
return authorizer.DecisionDeny, "valid user is required", err
}
uidScope := datasources.ScopeProvider.GetResourceScopeUID(attr.GetName())
// Must have query access to see a connection
if attr.GetResource() == b.connectionResourceInfo.GroupResource().Resource {
scopes := []string{}
if attr.GetName() != "" {
scopes = []string{uidScope}
}
ok, err := b.accessControl.Evaluate(ctx, user, ac.EvalPermission(datasources.ActionQuery, scopes...))
if !ok || err != nil {
return authorizer.DecisionDeny, "unable to query", err
}
if attr.GetSubresource() == "proxy" {
return authorizer.DecisionDeny, "TODO: map the plugin settings to access rules", err
}
return authorizer.DecisionAllow, "", nil
}
// Must have query access to see a connection
action := "" // invalid
switch attr.GetVerb() {
case "list":
ok, err := b.accessControl.Evaluate(ctx, user,
ac.EvalPermission(datasources.ActionRead)) // Can see any datasource values
if !ok || err != nil {
return authorizer.DecisionDeny, "unable to read", err
}
return authorizer.DecisionAllow, "", nil
case "get":
action = datasources.ActionRead
case "create":
action = datasources.ActionWrite
case "post":
fallthrough
case "update":
fallthrough
case "patch":
fallthrough
case "put":
action = datasources.ActionWrite
case "delete":
action = datasources.ActionDelete
default:
//b.log.Info("unknown verb", "verb", attr.GetVerb())
return authorizer.DecisionDeny, "unsupported verb", nil // Unknown verb
}
ok, err := b.accessControl.Evaluate(ctx, user,
ac.EvalPermission(action, uidScope))
if !ok || err != nil {
return authorizer.DecisionDeny, fmt.Sprintf("unable to %s", action), nil
}
return authorizer.DecisionAllow, "", nil
})
}